RESEARCH
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
More Articles
Malware Is Targeting Cookies On Android Devices To Gain Access
There's a new malware threat to be aware of, called "CookieThief," which is an apt name that describes what the malware does. Honestly though, the Hackers missed the mark here. "CookieMonster" would ...
Intel Graphics Get Update To Address Security Issues
If you have a personal computer that uses Intel technology, you're not going to want to miss the update released in March's Patch Tuesday. The latest update addresses a total of 27 ...
Google Chrome Guest Mode Is Great For Shared Computers
Google has recently rolled out a small but important change to its Chrome browser for Windows, Linux and macOS users. The most recent update adds a 'Default to Guest mode' to the ...
Certain RAM Modules Continue To Have Security Vulnerabilities
Remember the Rowhammer vulnerability that made headlines around the world last year? 2019 saw all sorts of unusual threats, so if you're struggling to recall the details of that one in particular, ...
Recent Data Breach Affects Some Walgreens Mobile App Users
Are you a Walgreens customer? Do you make use of the company's mobile app, available for both Android and iOS devices? If so, be advised that the company recently disclosed a serious ...
The Web Browser Wars Have A Clear Winner In 2020
It's notoriously difficult to get reliable statistics on web browser usage. While there are sites that purport to track such things such as StatCounter and NetMarketShare, the numbers coming from these sources ...
T-Mobile Is The Latest To Get Hit By Data Breach
Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was ...
How To Stay Secure While Working At Home
Companies all over the US are starting to send employees home during the workday (schools are also shutting their doors). The problem? Most organizations have not implemented work from home plans that consider cybersecurity threats introduced in a work from ...
Phone Call And Text Phishing Scams Are On The Rise
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on ...
New Phishing Emails Trick Users With Convincing Security Credentials
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year ...
Facebook Is Fighting Back Against Spam Accounts
Unless you're plugged into the world of social media, you may not realize it. There's a war on, and until recently, it was a war that Facebook was losing. The war is ...
JCrew Retailer Customers May Have Had Information Accessed
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential ...


